Conferences in DBLP
Giuseppe Longo Computer modelling and natural phenomena. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:1-5 [Conf ] Leon J. Osterweil Understanding process and the quest for deeper questions in software engineering research. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:6-14 [Conf ] Ari Jaaksi Assessing software projects: tools for business owners. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:15-18 [Conf ] Sebastián Uchitel , Jeff Kramer , Jeff Magee Behaviour model elaboration using partial labelled transition systems. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:19-27 [Conf ] Ralph D. Jeffords , Constance L. Heitmeyer A strategy for efficiently verifying requirements. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:28-37 [Conf ] Holger Giese , Matthias Tichy , Sven Burmester , Stephan Flake Towards the compositional verification of real-time UML designs. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:38-47 [Conf ] Don S. Batory , Jia Liu , Jacob Neal Sarvela Refinements and multi-dimensional separation of concerns. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:48-57 [Conf ] Petri Selonen , Jianli Xu Validating UML models against architectural profiles. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:58-67 [Conf ] Luciano Baresi , Reiko Heckel , Sebastian Thöne , Dániel Varró Modeling and validation of service-oriented architectures: application vs. style. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:68-77 [Conf ] Jeremy S. Bradbury , Jürgen Dingel Evaluating and improving the automatic analysis of implicit invocation systems. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:78-87 [Conf ] Giovanni Vigna , Fredrik Valeur , Richard A. Kemmerer Designing and implementing a family of intrusion detection systems. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:88-97 [Conf ] Gregory M. Kapfhammer , Mary Lou Soffa A family of test adequacy criteria for database-driven applications. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:98-107 [Conf ] Nguyen Tran Sy , Yves Deville Consistency techniques for interprocedural test data generation. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:108-117 [Conf ] Atif M. Memon , Mary Lou Soffa Regression testing of GUIs. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:118-127 [Conf ] Alessandro Orso , Taweesup Apiwattanapong , Mary Jean Harrold Leveraging field data for impact analysis and regression testing. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:128-137 [Conf ] James D. Herbsleb , Audris Mockus Formulation and preliminary test of an empirical theory of coordination in software engineering. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:138-137 [Conf ] Tore Dybå Factors of software process improvement success in small and large organizations: an empirical study in the scandinavian context. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:148-157 [Conf ] João W. Cangussu , Raymond A. DeCarlo , Aditya P. Mathur Monitoring the software test process using statistical process control: a logarithmic approach. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:158-167 [Conf ] Matthias M. Müller , Frank Padberg On the economic evaluation of XP projects. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:168-177 [Conf ] Jens Krinke Context-sensitive slicing of concurrent programs. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:178-187 [Conf ] Oksana Tkachuk , Matthew B. Dwyer Adapting side effects analysis for modular program model checking. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:188-197 [Conf ] Dennis Brylow , Jens Palsberg Deadline analysis of interrupt-driven software. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:198-207 [Conf ] Claus Pahl , Michael Casey Ontology support for web service processes. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:208-216 [Conf ] Jukka Viljamaa Reverse engineering framework reuse interfaces. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:217-226 [Conf ] Dirk Ohst , Michael Welle , Udo Kelter Differences between versions of UML diagrams. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:227-236 [Conf ] Stan Jarzabek , Shubiao Li Eliminating redundancies with a "composition with adaptation" meta-programming technique. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:237-246 [Conf ] Yung-Pin Cheng , Michal Young , Che-Ling Huang , Chia-Yi Pan Towards scalable compositional analysis by refactoring design models. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:247-256 [Conf ] Dimitra Giannakopoulou , Jeff Magee Fluent model checking for event-based systems. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:257-266 [Conf ] Robby , Matthew B. Dwyer , John Hatcliff Bogor: an extensible and highly-modular software model checking framework. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:267-276 [Conf ] Fei Xie , James C. Browne Verified systems by composition from verified components. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:277-286 [Conf ] Stephen McCamant , Michael D. Ernst Predicting problems caused by component upgrades. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:287-296 [Conf ] Hridesh Rajan , Kevin J. Sullivan Eos : instance-level aspects for integrated system design. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:291-306 [Conf ] Suan Hsi Yong , Susan Horwitz Protecting C programs from attacks via invalid pointer dereferences. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:307-316 [Conf ] V. Benjamin Livshits , Monica S. Lam Tracking pointers with path and context sensitivity for bug detection in C programs. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:317-326 [Conf ] Yichen Xie , Andy Chou , Dawson R. Engler ARCHER: using symbolic, path-sensitive analysis to detect memory access errors. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:327-336 [Conf ] Koushik Sen , Grigore Rosu , Gul Agha Runtime safety analysis of multithreaded programs. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:337-346 [Conf ] Nikunj R. Mehta , Nenad Medvidovic Composing architectural styles from architectural primitives. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:347-350 [Conf ] Kleanthis Thramboulidis Towards an engineering tool for implementing reusable distributed control systems. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:351-354 [Conf ] Antonia Bertolino , Stefania Gnesi Use case-based testing of product lines. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:355-358 [Conf ] Rik Eshuis , Pierre Brimont , Eric Dubois , Bertrand Grégoire , Sophie Ramel EFFICIENT: a tool set for supporting the modelling and validation of ebXML. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:359-362 [Conf ] Simonetta Balsamo , Moreno Marzolla A simulation-based approach to software performance modeling. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:363-366 [Conf ] Alexander Ran , Raimondas Lencevicius Making sense of runtime architecture for mobile phone software. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:367-370 [Conf ] Eunyoung Lee , Andrew W. Appel Policy-enforced linking of untrusted components. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:371-374 [Conf ] Paulo Asterio de Castro Guerra , Cecília M. F. Rubira , Alexander B. Romanovsky , Rogério de Lemos A fault-tolerant software architecture for COTS-based software systems. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:375-378 [Conf ] Richard S. Hall , Humberto Cervantes Gravity: supporting dynamically available services in client-side applications. [Citation Graph (0, 0)][DBLP ] ESEC / SIGSOFT FSE, 2003, pp:379-382 [Conf ]